The Android mobile market has expanded greatly in recent years, but with its increased market share Android became a popular target for malware developers. The latest Anti-Virus reports suggest that Android account for the majority of malware detected on mobile devices. This is largely due to the open nature of Android development and the level of system utilities Android software developers are given access to. This paper reviews the currently available open source solutions available, for analysing mobile malware. In this paper the authors, provide an overview of the anatomy of an Android applications. Several malware analysis tools and reverse engineering tools have been developed to analyse and deconstruct APK files. The paper presents a method by which common open source tools can be used to dissect the APK file to uncover its intent. To conclude the authors identify the current shortcomings, with regards to currently available open source software, when it comes to the classification of malicious Android applications.
Reference:
Burke, I and Pieterse, H. 2015. How to tame your android malware. In: 10th International Conference on Cyber Warfare and Security, Kruger National Park, South Africa, 24-25 March 2015, pp 54-65.
Burke, I. D., & Pieterse, H. (2015). How to tame your android malware. http://hdl.handle.net/10204/8266
Burke, Ivan D, and Heloise Pieterse. "How to tame your android malware." (2015): http://hdl.handle.net/10204/8266
Burke ID, Pieterse H, How to tame your android malware; 2015. http://hdl.handle.net/10204/8266 .